31
Finalist Catalog

Finalist Catalog

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Finalist Catalog

Finalist Catalog

Page 2: Finalist Catalog

Welcome to The Cybersecurity Visuals Challenge Finalist Catalog!

As we launched this Challenge in July 2019, we asked a global community: “How might we reimagine a more compelling and relatable visual language for cybersecurity?” We were looking for visual creators from diverse backgrounds eager to apply their skill set to this important work.

In total, we had 165 unique visual creators submit 209 ideas from 14 countries across 6 continents. We’re thrilled to announce the five

Top Ideas and samples of their work in this catalog:

Abraham Pena, United States of America Afsal CMK, IndiaClaudio Rousselon, MexicoIvana Troselj, AustraliaMariah Jochai, United States of America

We’d also like to congratulate the other 18 shortlisted finalists whom you can also learn more about in this catalog. We are grateful for their collective work that has already helped to elevate the visual language of cybersecurity, and hope that you’ll utilize their designs in the future. We welcome you to browse the full submissions here, which are openly licensed for your use.

COME

Page 3: Finalist Catalog

This Challenge would not have been possible without the support, commitment, and time from our many partners. Join us in thanking:

AJ Grotto, Stanford UniversityAndreas Kuehn, EastWest InstituteBurton Rast, GoogleCharlotte Stanton, Carnegie Endowment for International PeaceChelsea Takamine, OpenIDEODima Boulad, OpenIDEO Eli Sugarman, Hewlett Foundation Heath Wickline, Hewlett FoundationHeather King, Cyber Threat AllianceHerb Lin, Stanford University Jen Ellis, Rapid7Jim Baker, R Street InstituteJoanne O’Connor, Hewlett Packard EnterpriseJonathan Barrett, Vectra AIKristy Tsadick, Hewlett Foundation Lauren Ito, OpenIDEOMichael Martelle, The National Security ArchiveMike Hsieh, Transformative Cyber Innovation LabMike McNerny, Arbor NetworksMonica Ruiz, Hewlett FoundationRay Davidson, Michigan Cyber Civilian Corps / State of MichiganRenee DiResta, Mozilla FellowPhilip Reiner, Technology for Global SecurityScott Rosenberg, AxiosStephanie Sizemore, OpenIDEOSteve Weber, UC Berkeley Susan Hennessey, Brookings + Lawfare

We hope that you enjoy learning more about this community of creators and their visions for reimagining the visual language of cybersecurity.

Thank you for your interest in this Challenge!

THE CYBERSECURITY VISUALS CHALLENGE TEAM

All shortlisted submissions are openly licensed under Creative Commons (CC BY 4.0), which means that while the creators retain copyright to their materials, they give others permission to distribute, remix, and build on the work, as long as the artist is credited for the original work.

Page 4: Finalist Catalog

Ivana Troselj

10

Abraham Joel Pena Puleo

7

Afsal CMK

8

Claudio Rousselon

9

Mariah Jochai

11

CONTENTS

TOP IDEAS

Page 5: Finalist Catalog

Rebecca Wang

28

Tiffany Baker

30

Thomas Grimer

29

Nathaniel Anderson

27

Mai Arollado

26

Khanh Tran

24

Linda Graf

25

CONTENTS

FINALISTS

Abrahma Tansini

13

Aswin Kumar Behera

15

Alaina Nicol

14

Ifrah Yousuf

20

Jason Kravitz

21

Elio Reichert

19

Bronney Hui

16

Caroline Matthews

17

Conor Caplice

18

Jeroen de Bakker

22

John Hurley

23

Page 6: Finalist Catalog

5

Page 7: Finalist Catalog

7TOP IDEAA

RT

IST

’S S

TAT

EM

EN

T

ABRAHAM JOEL PENA PULEOWeb designer and brand strategist with more than 8 years of experience

[email protected]

UNITED STATES OF AMERICA

However, as in nature, we can evolve the handling of tools and the adoption of tools and behaviors to present better defenses against possible digital attacks.

Studying the concepts of hacking and the reasons behind it, I realized that there are obvious similarities in the behaviors, abilities and characteristics of the predators and prey of the animal kingdom, with respect to their human counterparts, hackers and victims.

AP

PLIC

AT

ION

Page 8: Finalist Catalog

8TOP IDEAA

RT

IST

’S S

TAT

EM

EN

T

AFSAL CMKArtist; coder; enjoys turning complex problems into simple designs

https://dribbble.com/afsalcreations

[email protected]

INDIA

Also to make this field rich with diverse communities to make them feel like they’re part of this. Each of these visuals communicates a specific topic for privacy and encryption. That helps to bring awareness about individual responsibility, and also gives a better understanding of digital security and privacy.

The key vision for crafting these visuals was to communicate digital privacy and encryption by following design principles like humanizing the space, incorporating technical accuracy, and building more familiar metaphors that are easy to understand for an average person.

AP

PLIC

AT

ION

Page 9: Finalist Catalog

9TOP IDEAA

RT

IST

’S S

TAT

EM

EN

T

CLAUDIO ROUSSELONVisual artist + muralist; interest in tech, sci-fi, aerospace + energy science

instagram.com/badrattus

[email protected]

MEXICO

Although there are no tangible political borders in cyberspace, we can still experience restrictions due to a country’s policies on the use of the web or compatibility issues when it comes to technology/hardware.

A glimpse into the ever evolving digital world and the technology that is a part of our everyday life. The current situation on borders all around the globe is getting to a critical point of conflict.

AP

PLIC

AT

ION

Page 10: Finalist Catalog

10TOP IDEAA

RT

IST

’S S

TAT

EM

EN

T

IVANA TROSELJPhD student in cybersecurity; fine arts / illustration

[email protected]

AUSTRALIA

A vintage style of children’s book illustration brings to life new threats, while reminding us that the story of trust is as old as time.

This is a concept of personal online security in the guise of a cautionary children’s bedtime story. Strange beasts and supernatural elements collide with the everyday.

AP

PLIC

AT

ION

Page 11: Finalist Catalog

11TOP IDEAA

RT

IST

’S S

TAT

EM

EN

T

MARIAH JOCHAIArt director; 10 years experience in fashion and tech

craftograph.com

UNITED STATES OF AMERICA

My goal was to illustrate familiar ideas from nature that, when paired with headlines describing the complex concepts of cybersecurity, would spark intrigue and inspire viewers to read on or learn more about the topic.

Before I began illustrating any one of the opportunity areas, I looked at them through the lens of the natural world. Using this metaphor makes the concepts more accessible to viewers across cultures, as nature is all around us.

AP

PLIC

AT

ION

Page 12: Finalist Catalog
Page 13: Finalist Catalog

13FINALISTA

RT

IST

’S S

TAT

EM

EN

T

ABRAHMA TANSINIGraphic designer and freelance digital illustrator

behance.net/abrahmatan

[email protected]

SPAIN

that are intended to be understandable to any audience. In my illustrations I have tried to expose that the issue of privacy information and cybersecurity is a theme of humanity, of our instincts to protect ourselves and ensure a better future for ours. Who has the information has greater control and power of decision.

As a graphic designer I used comic and humor as a tool to explain complex concepts of cybersecurity to everybody. The topic of security and cybersecurity is a human need. This series of illustrations can be used in newspapers and magazines. They contain a very simple language (black and white illustrations)

AP

PLIC

AT

ION

Page 14: Finalist Catalog

14FINALISTA

RT

IST

’S S

TAT

EM

EN

T

ALAINA NICOLStrategic designer; web developer; artist; founder of a digital studio

visualadapter.com

[email protected]

UNITED STATES OF AMERICA

Image one is meant to describe what a web shell is. His demeanor is consistent with our generalized perception a hacker; secretive, capable, confident, and mischievous, always working quickly and efficiently towards his goal. Image two shows how the web shell infiltrates. He successfully installs himself into a device through a vulnerable portal and enables control. Image three depicts what happens.

Webb Shell is a visual, somewhat literal, discovery of the concept of what a web shell is. I approached this Challenge without previous knowledge of this cyber threat so I based the intention of this story under the same premise - to educate the general public in few words, or visuals in this instance.

AP

PLIC

AT

ION

Page 15: Finalist Catalog

15FINALISTA

RT

IST

’S S

TAT

EM

EN

T

ASWIN KUMAR BEHERAMechanical engineer with interest in visual design and experience modeling

codepen.io/aswinbehera

[email protected]

INDIA

unravel the intricacies of the system that is increasingly influencing the foundation of our society. Data valuation, data collection and creation of personality models and its respective use in disinformation campaigns are some of the things I have attempted to explain in the portfolio. Final portfolio includes animations.

The web is an evolving and ever-growing medium that connects every one of us. I have made a minuscule attempt to capture this dynamic nature. The portfolio represents visualization of five concepts, arranged in increasing order of difficulty to visualize. We start with the things, everyone is familiar with and discuss on a regular basis and go on to

AP

PLIC

AT

ION

Page 16: Finalist Catalog

16FINALISTA

RT

IST

’S S

TAT

EM

EN

T

BRONNEY HUIProfessional photographer and graphic designer for nearly 20 years

bronney.com

[email protected]

CANADA

Companies who host these platforms are constantly under scrutiny but I think the users have to be educated and take responsibility too.

In the era of social media everyone is sharing everything. Sometimes even sharing it on live streams where there’s no edit or content gateway. Although we all try our best to filter what we share, it’s inevitable that we will sometimes share things that we regret later.

AP

PLIC

AT

ION

Page 17: Finalist Catalog

17FINALISTA

RT

IST

’S S

TAT

EM

EN

T

CAROLINE MATTHEWSDigital designer with eight years of agency and media experience

caromatt.squarespace.com

[email protected]

UNITED STATES OF AMERICA

Both informative and alarming, the PSA “The Internet is not. free” calls users to grapple with their digital shadow. The target audience are those that are the most vulnerable to abusive data surveillance: those that grew up sharing online as digital natives.

AP

PLIC

AT

ION

Page 18: Finalist Catalog

18FINALISTA

RT

IST

’S S

TAT

EM

EN

T

CONOR CAPLICEContent manager with background in writing; self-taught coder

conorcaplice.com

[email protected]

UNITED STATES OF AMERICA

(maybe?). My aim is simply to link the concepts of sexuality and cybersecurity in people’s minds to make the process of learning about cybersecurity more enjoyable because let’s face it, its really not that enjoyable for the average person, while also demonstrating the importance of good cybersecurity practices.

My final portfolio is a fantastic concept trapped behind the limited graphic design skills of a man who only has GIMP to work with. It’s funny, clever, and dare I say it - sexy. It is also, unfortunately, held back by its creators lack of design skills and aesthetic abilities. Thus, my portfolio is best graded on a curve (kidding!)

AP

PLIC

AT

ION

Page 19: Finalist Catalog

19FINALISTA

RT

IST

’S S

TAT

EM

EN

T19

ELIO REICHERTGraphic designer with experience in digital media and interest in informatics

elioreichert.de

[email protected]

GERMANY

Also, the illustration of a dam gives a feeling what it is about to take control of your personal data stream to make your own cyber world a safe environment.

My final portfolio visualizes the danger of phishing and shows a cybersecurity awareness game in action. It clears up that not every password manager is safe and should be blindly trusted.

AP

PLIC

AT

ION

Page 20: Finalist Catalog

20FINALISTA

RT

IST

’S S

TAT

EM

EN

T

IFRAH YOUSUFGraduate student; UX designer passionate about inclusive design

ifrahyousuf.com

[email protected]

CANADA

I wanted these images not only be understood by cybersecurity professionals, but also the average person with no knowledge/experience in cybersecurity (like I was before this Challenge).

My final portfolio can be summarized by the phrase ‘As Not Seen on TV.’ Television and media constantly perpetuate stereotypes about cybersecurity that are misinformed and harmful. As a result, the average person does not know much about cybersecurity.

AP

PLIC

AT

ION

Page 21: Finalist Catalog

21FINALISTA

RT

IST

’S S

TAT

EM

EN

T

JASON KRAVITZWorked in cybersecurity ~20 yrs; data visualization; photography

jason.aminus3.com

[email protected]

UNITED STATES OF AMERICA

These creations are a lighthearted look into how each of us are personally impacted by cybercrime, where and how we are most at risk, and who is actively seeking to exploit our digital life. Included with submission: myothercomputer.com/openideo

Malicious hackers are not always the people you might expect. In the physical world it is much more obvious what is risky and what is safe. In the digital world it is often not as clear. As our technology gets “smarter” and more connected, it can become more vulnerable to being accessed or abused for malicious use.

AP

PLIC

AT

ION

Page 22: Finalist Catalog

22FINALISTA

RT

IST

’S S

TAT

EM

EN

T

JEROEN DE BAKKERDocumentary photographer; runs a cybersecurity photography project

jdebakker.com

[email protected]

NETHERLANDS

An inspiring photography guide for photographers, journalists and media makers. Showing it is possible to photograph imagery for this subject that avoids stereotypes, uses real world images and does justice to the subject.

AP

PLIC

AT

ION

Page 23: Finalist Catalog

23FINALISTA

RT

IST

’S S

TAT

EM

EN

T

JOHN HURLEYUI/UX + visual design; multi-disciplinary collaboration; musician

johnhurleydesign.com

[email protected]

UNITED STATES OF AMERICA

As the frequency of data breaches and coordinated cyber attacks continues to increase, this automatic behavior must be brought into question. As more services and organizations suffer breaches, the data points can be cross referenced to build a more complete picture of you. Final portfolio includes an animation.

Our submission is a storyboard for an animated short about surveillance. The story follows a user who might be signing up for a new app/service or posting on an existing service and is prompted with a sequence of permission requests. The user blindly agrees to share the requested information, a habit that’s become far too common.

AP

PLIC

AT

ION

Page 24: Finalist Catalog

24FINALISTA

RT

IST

’S S

TAT

EM

EN

T

KHANH TRANAspiring UX designer with comic-drawing hobby; ex-Google

khtran.com

UNITED STATES OF AMERICA

While these issues are diverse, I felt most compelled with (5) cybersecurity specialists since they are rarely portrayed in media. I used a lot of analogy from history and real-life games to help the general public grasp ideas quickly and easily. I am aware that using binary numbers is not encouraged but, for the sake of the message, I included them in a few visuals.

My portfolio shows the different conversations about: (1) Unknown of New Technologies, (2) Arms Race between the United States and China, (3) Smart Cities (4) Digital Privacy in Social Media and (5) Cybersecurity Specialists.

AP

PLIC

AT

ION

ARTIST’S STATEMENT

Page 25: Finalist Catalog

25FINALISTA

RT

IST

’S S

TAT

EM

EN

T

LINDA GRAFFreelance graphic designer; excited about intersection of tech and design

[email protected]

GERMANY

This way, I want to visualize the malicious code, regardless of a specific programming language. In the next step I will work out the graphics of the sketch with Illustrator and Photoshop.

With this sketch I would like to illustrate how a cyber conflict can damage or stop the energy supply of a country by an attack. I want to portray the attack with a kind of lasso that contains binary code.

AP

PLIC

AT

ION

Page 26: Finalist Catalog

26FINALISTA

RT

IST

’S S

TAT

EM

EN

T

MAI AROLLADOIndustrial designer + artist; believes design can save humanity

linkedin.com/in/mai-arollado-0b974951

[email protected]

CHINA

I have decided to narrow down my focus. This artwork depicts malware in a form of landmine on a cyber realm. Imagine yourself walking barefoot with out any caution and protection on where you step or click next in a cyber world might be detrimental to you.

AP

PLIC

AT

ION

Page 27: Finalist Catalog

27FINALISTA

RT

IST

’S S

TAT

EM

EN

T

NATHANIEL ANDERSONWebsite designer; animator; photographer

vessul.co

[email protected]

UNITED STATES OF AMERICA

more like you’re showing they world all your data. The data brokers images are a way to showcase how typical these data brokers really are and how personal your data can be that is sold without you even knowing about it. Data brokers aren’t guys in hoodies in the basement, they’re big companies. Final portfolio includes animated GIFs.

Looking in the wrong direction. It’s easy to get caught up in social media and what is trending and not look at what is really being done with your data and how easy it can be to obtain it. The coffee shop photos are showcasing how visible some data is on open wifi networks. It’s a little less about someone directly opening your computer like they have access and

AP

PLIC

AT

ION

Page 28: Finalist Catalog

28FINALISTA

RT

IST

’S S

TAT

EM

EN

T

REBECCA WANGStudent in product design; former graphic designer

[email protected]

CANADA

as part of a “smart home” - a nursery and a bathroom. These are both sensitive places, which I chose to give context to what having an IoT home means, and motivate people to protect themselves. The characters are doing basic things to protect themselves in a relaxed way, showing that security isn’t difficult or overwhelming.

My original concept was to emphasize the less threatening side of personal cybersecurity and how it relates to IoT devices. I have expanded upon this idea in my final submission, which includes illustrations depicting simple ways people can better improve their cybersecurity with smart devices. I’ve drawn people in environments you normally don’t think of

AP

PLIC

AT

ION

Page 29: Finalist Catalog

29FINALISTA

RT

IST

’S S

TAT

EM

EN

T

THOMAS GRIMERFreelance creative; focus on new product + service concept generation

linkedin.com/in/thomasgrimer

[email protected]

UNITED KINGDOM

or have provided a wider concept and feeling without dictating i.e. a specific adversary. Where it has been necessary to depict a bad player/character I have tried to use human features or a character with no personality and in order to prevent loading it with any initial bias.

The images are not intended to stand alone - but to convey ideas or feelings that authors may apply for their own purposes and provide greater meaning via their given context. These are visual tools for others to use. Where possible I have either attempted to simplify a complicated technique (see encryption)

AP

PLIC

AT

ION

Page 30: Finalist Catalog

30FINALISTA

RT

IST

’S S

TAT

EM

EN

T

TIFFANY BAKERPhoto-illustrator for CNN; painter; digital collage artist

tiffany-baker.com

[email protected]

UNITED STATES OF AMERICA

Using a variety of different subjects, I am making a commentary about how ubiquitous biometric verification is in our lives and how it touches a wide audience.

My final portfolio deals with the subject of digital identity illustrated through five unique vignettes. The likeness of each subject is copied, distorted, or made ambiguous in some way.

AP

PLIC

AT

ION

Page 31: Finalist Catalog